Wireless Outdoor Access Point & Client Bridge

User’s Manual
Version: 1.0

Long Range Wireless Access Point / Client Bridge

Version 1.0

Table of Contents
1 INTRODUCTION .................................................................................................................... 5 1.1 1.2 1.3 1.4 1.5 1.6
a) b)

FEATURES........................................................................................................................ 5 PACKAGE CONTENTS ........................................................................................................ 6 SAFETY GUIDELINES ......................................................................................................... 6 SYSTEM REQUIREMENTS .................................................................................................. 6 APPLICATIONS .................................................................................................................. 7 NETWORK CONFIGURATION............................................................................................... 7
Ad-hoc (peer-to-peer) Mode.................................................................................................... 7 Infrastructure Mode ................................................................................................................. 8

2

UNDERSTANDING THE HARDWARE .................................................................................. 9 2.1 2.2 2.3 2.4 HARDWARE INSTALLATION ................................................................................................ 9 HARDWARE DESCRIPTION ................................................................................................. 9 MOUNTING KITS ............................................................................................................. 10 IP ADDRESS CONFIGURATION ......................................................................................... 10

3

SWITCHING BETWEEN OPERATING MODES.................................................................. 12 3.1 LOGGING IN .................................................................................................................... 12

4

ACCESS POINT OPERATING MODE ................................................................................. 13 LOGGING IN ................................................................................................................................. 13 STATUS ....................................................................................................................................... 14 MAIN ........................................................................................................................................... 14 WIRELESS CLIENT LIST ................................................................................................................ 15 SYSTEM LOG ............................................................................................................................... 15 SYSTEM..................................................................................................................................... 16 SYSTEM PROPERTIES .................................................................................................................. 16 IP SETTINGS ............................................................................................................................... 16 SPANNING TREE SETTINGS .......................................................................................................... 17 WIRELESS ................................................................................................................................... 18 WIRELESS NETWORK ................................................................................................................... 18 WIRELESS SECURITY - WEP ........................................................................................................ 18 WIRELESS SECURITY – WPA-PSK, WPA2-PSK, WPA-MIXED ..................................................... 19 WIRELESS SECURITY – WPA, WPA2 ........................................................................................... 20 WIRELESS MAC FILTER ............................................................................................................... 21 WIRELESS ADVANCED SETTINGS .................................................................................................. 22 MANAGEMENT ............................................................................................................................. 24 ADMINISTRATION ......................................................................................................................... 24 SNMP SETTINGS ........................................................................................................................ 24 BACKUP/RESTORE SETTINGS, RESET TO FACTORY DEFAULT SETTINGS........................................... 25 FIRMWARE UPGRADE ................................................................................................................... 26 TIME SETTINGS ........................................................................................................................... 27 LOG ............................................................................................................................................ 27

5

CLIENT BRIDGE OPERATING MODE................................................................................ 28 5.1 5.2 5.2.1 5.2.2 5.2.3 5.3 5.3.1 LOGGING IN .................................................................................................................... 28 STATUS.......................................................................................................................... 29 MAIN .............................................................................................................................. 29 CONNECTION STATUS ..................................................................................................... 30 SYSTEM LOG .................................................................................................................. 30 SYSTEM ....................................................................................................................... 31 SYSTEM PROPERTIES ..................................................................................................... 31
2

Long Range Wireless Access Point / Client Bridge

Version 1.0

5.3.2 5.3.3 5.4 5.4.1 5.4.2 5.4.3 5.4.4 5.5 5.5.1 5.5.2 5.5.3 5.5.4 5.5.5 5.5.6 6

IP SETTINGS .................................................................................................................. 31 SPANNING TREE SETTINGS ............................................................................................. 32 WIRELESS ...................................................................................................................... 33 WIRELESS NETWORK ...................................................................................................... 33 WIRELESS SECURITY - WEP........................................................................................... 34 WIRELESS SECURITY – WPA-PSK, WPA2-PSK, ............................................................ 35 WIRELESS ADVANCED SETTINGS ..................................................................................... 35 MANAGEMENT ................................................................................................................ 36 ADMINISTRATION ............................................................................................................ 36 SNMP SETTINGS ........................................................................................................... 37 BACKUP/RESTORE SETTINGS, RESET TO FACTORY DEFAULT SETTINGS ............................. 38 FIRMWARE UPGRADE...................................................................................................... 38 TIME SETTINGS .............................................................................................................. 39 LOG ............................................................................................................................... 39

CLIENT ROUTER OPERATING MODE............................................................................... 41 6.1 6.2 6.2.1 6.2.2 6.2.3 6.3 6.3.1 6.4 6.4.1 6.4.1.1 6.4.1.2 6.4.1.3 6.4.2 6.5 6.5.1 6.5.1.1 6.5.1.2 6.5.2 6.6 5.5.7 5.5.8 5.5.9 5.5.10 5.5.11 5.5.12 LOGGING IN .................................................................................................................... 41 STATUS.......................................................................................................................... 42 MAIN .............................................................................................................................. 42 CONNECTION STATUS ..................................................................................................... 43 SYSTEM LOG .................................................................................................................. 43 SYSTEM ....................................................................................................................... 44 SYSTEM PROPERTIES ..................................................................................................... 44 ROUTER ......................................................................................................................... 44 WAN SETTINGS ............................................................................................................. 44 WAN - DHCP............................................................................................................ 45 WAN – STATIC IP ...................................................................................................... 46 WAN – PPPOE ......................................................................................................... 47 VPN PASS THROUGH ..................................................................................................... 48 WIRELESS ...................................................................................................................... 48 WIRELESS NETWORK ...................................................................................................... 48 WIRELESS SECURITY - WEP ...................................................................................... 49 WIRELESS SECURITY – WPA-PSK, WPA2-PSK,........................................................ 50 WIRELESS ADVANCED SETTINGS ..................................................................................... 51 MANAGEMENT ................................................................................................................ 52 ADMINISTRATION ............................................................................................................ 52 SNMP SETTINGS ........................................................................................................... 53 BACKUP/RESTORE SETTINGS, RESET TO FACTORY DEFAULT SETTINGS ............................. 54 FIRMWARE UPGRADE ................................................................................................. 55 TIME SETTINGS .......................................................................................................... 55 LOG ........................................................................................................................... 56

APPENDIX A – SPECIFICATIONS............................................................................................... 57 APPENDIX B – FCC INTERFERENCE STATEMENT ................................................................. 60

3

0 Date August 24.0 Revision History Version 1.Long Range Wireless Access Point / Client Bridge Version 1. 2008 Notes Initial Version 4 .

In addition. This product comes with PoE injector for building in outdoor environment easily.4GHz It works in 2.11i WEP.0 1 Introduction EOC-2610 is a long range outdoor wireless Access Point and Client Bridge that operates seamlessly in the 2. it can encrypt all wireless transmissions through 64/128-bit WEP data encryption and also supports WPA/WPA2. package contents. and array of features make EOC-2610 a suitable wireless solution for your residence or office. It also reduces the expense of equipment in the same environment. To protect your wireless connectivity. applications. WPA. the User Isolation function can protect the private network between client users.Long Range Wireless Access Point / Client Bridge Version 1. It features high transmitted output power and high receivable sensitivity. It supports distance range from 1km to 30km and RSSI indicator which enables the best transmit and receive signals for traffic communication.1 Features Wireless • 2. and network configuration.4GHz frequency spectrum • High output power Transmit output power programmable for different country selections • • • • High Data Rate High speed transmitting rate up to 108Mbps with Super G. WPA2 (Encryption support TKIP/AES) 5 . high performance. making network build-up easier • QoS(WMM) Enhance performance and quality of service Security • 802. This chapter describes the features. support large payload such as MEPG video streaming Multifunction application Access Point/Client Bridge/Client Router Long range transmitting Transmit power control and distance control (ACK timeout) Signal Strength LED indicators have the best transmit and receive signal for traffic communication Networking • Public wireless solution An AP interface that is especially useful in public areas such as hotspots and enterprise • Signal Strength Display RF signal strength status shown LEDs of 3 colors. The MAC address filter lets you select exactly which stations should have access to your network. The attractive design.4GHz frequency spectrum. High output power and high sensitivity can extend range and coverage to reduce the roaming between Access Points to get a more stable wireless connection. 1.

1x IEEE 802. also follow all instruction labels on this device. Do not place any hot devices close to this unit. please adhere to the following safety guidelines. the unit must be shipped in its original package. 6 . as they may degrade or cause damage to the unit. This unit may drop and become damaged.3 Safety Guidelines In order to reduce the risk of fire. Use a soft dry cloth for cleaning.4 System Requirements The following are the minimum system requirements in order configure the device.1x Authenticator MAC address functions MAC address filter (AP mode) L2 isolation Station isolation Management • Firmware Upgrade Upgrading firmware via web browser. 1* 802.11b/g Long range AP/CB (EOC-2610) 1* PoE injector (EPE-1212) 1* Power Adaptor 1* CD with User’s Manual 1* Quick Installation Guide (QIG) 1* Metal strap 1* Special screw set 1. this device should not be connected to any other adapters. User can export all setting into a file via WEB • MIB MIB I. Do not discard the packing materials.Long Range Wireless Access Point / Client Bridge Version 1. Do not spill liquid of any kind on this device.0 • • • • 802. Do not expose this unit to direct sunlight. electric shock and injury. Do not place the unit on an unstable stand or table. Except for the power adapter supplied. and make sure that none of the items listed below are missing. V2c 1. in case of return. setting are reserved after upgrade • Reset & Backup Reset to factory default. Carefully follow the instructions in this manual. 1. Do not use liquid cleaners or aerosol cleaners. Do not place any heavy objects on top of this unit. MIB II(RFC1213) • SNMP V1.2 Package Contents Open the package carefully.

5 Applications The wireless LAN products are easy to install and highly efficient. b) Infrastructure for enterprise LANs. older buildings. f) Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves. easy and quick installation of a small network. and learning. d) Frequently changed environments Show rooms. Historic buildings. and other changes with wireless LANs.0 PC/AT compatible computer with an Ethernet interface. and manufacturing sites where frequently rearrange the workplace. The wireless LAN products can be configured as: a) Ad-hoc (or peer-to-peer) for departmental or SOHO LANs. it might be helpful to depict a few of the possible wireless LAN PC card network configurations. exhibition centers. b) Temporary workgroups Consider situations in parks. g) Wired LAN backup Network managers implement wireless LANs to provide backup for missioncritical applications running on wired networks. information exchanges. serving customers and processing information. open areas and across busy streets make the installation of LANs either impossible or very expensive. a) Ad-hoc (peer-to-peer) Mode 7 . e) Small Office and Home Office (SOHO) networks SOHO users need a cost-effective.Long Range Wireless Access Point / Client Bridge Version 1. athletic arenas. 1. point-of-sale employees. extensions to networks. h) Training/Educational facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information. and warehouse workers can access real-time information while dealing with patients. retail stores. c) The ability to access real-time information Doctors/nurses. meeting rooms. Operating system that supports HTTP web-browser 1.6 Network Configuration To better understand how the wireless LAN products work together to create a wireless network. temporary offices and construction sites where one wants a temporary WLAN established and removed. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs: a) Difficult-to-wire environments There are many situations where wires cannot be laid easily. disasterrecovery.

each client is peer-topeer. the AP can extend the range of independent wireless LANs by acting as a repeater. The image below depicts a network in infrastructure mode. If used in stand-alone.0 This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network whenever they are within range of one another. The image depicts a network in ad-hoc mode. which effectively doubles the distance between wireless stations. This is the easiest and least expensive way for the SOHO to set up a wireless network. In ad-hoc mode. would only have access to the resources of the other client and does not require an access point. In this mode. b) Infrastructure Mode The infrastructure mode requires the use of an access point (AP). It doesn’t matter if the AP is stand-alone or wired to an Ethernet network.Long Range Wireless Access Point / Client Bridge Version 1. all wireless communication between two computers has to be via the AP. 8 .

Long Range Wireless Access Point / Client Bridge Version 1. Cable/DSL Modem Ethernet PoE Injector AC/DC cable Power Outlet Ethernet Access Point 2. Insert the DC-inlet of the power adapter into the 24V port of the PoE injector and the other end into the power socket on the wall. Plug one end of another Ethernet cable to AP/Bridge port of the PoE injector and the other end into you cable/DSL modem (Internet) 4.2 Hardware Description The images below depict the front and rear panel of the Access Point / Client Bridge.0 2 Understanding the Hardware 2.1 Hardware Installation 1. This diagram depicts the hardware configuration PC. 2. Plug one end of the Ethernet cable into the Network port of the PoE injector and another end into your PC/Notebook. 3. Place the unit in an appropriate location after conducting a site survey. Front Panel Rear Panel 9 .

In the control panel. Standard Pole Mount Optional Wall Mount Optional Window Mount 2.Long Range Wireless Access Point / Client Bridge Version 1.0 2. The default IP address of the device is 192. You will then see the following screen.168. you must first configure the TCP/IP settings of your PC/Notebook. 1.3 Mounting Kits The images below depict the standard and optional mounting kits. double click Network Connections and then double click on the connection of your Network Interface Card (NIC). 10 .1.1 In order to log into this device.4 IP Address Configuration This device can be configured as a Bridge/Router or Access Point.

For Example: PC IP address: 192. and once again to close LAN properties window. Select Internet Protocol (TCP/IP) and then click on the Properties button.168.255.255.10 PC subnet mask: 255. This will allow you to configure the TCP/IP settings of your PC/Notebook. 3.0 2.0 4. 11 . Click on the OK button to close this window.Long Range Wireless Access Point / Client Bridge Version 1. Select Use the following IP Address radio button and then enter the IP address and subnet mask. Ensure that the IP address and subnet mask are on the same subnet as the device.1.

After logging in.1) into the address bar of the web-browser and press Enter. Select and operating mode from the list (Access Point.1 Logging In To configure the device through the web-browser. and Client Router. After connecting to the IP address. Client Bridge. Click on the System Properties link under the System navigation drop-down menu. 12 . Client t Bridge. 3. or Client Router) and then click on the Apply button.1.0 3 Switching Between Operating Modes This device can operate in three modes: Access Point. Specify admin for both the user name and password. the web-browser will display the login page. Refer to Chapter 2 in order to configure the IP address of your computer. Make sure that the device and your computers are configured on the same subnet. you will see the graphical user interface of the device.168.Long Range Wireless Access Point / Client Bridge Version 1. enter the IP address of the device (default: 192. This chapter will describe how to switch between operating modes.

Specify admin for both the user name and password. 1. and event log. and security. connection status.1) into the address bar of the web-browser and press Enter. After connecting to the IP address. Make sure that the device and your computers are configured on the same subnet.1. System: This menu includes the system properties. 3. After logging in you will graphical user interface (GUI) of the device. the web-browser will display the login page. IP and Spanning Tree settings. Wireless: This menu includes status. 13 . and save/restore backup. 4.0 4 Access Point Operating Mode Logging In To configure the device through the web-browser. Management: This menu includes the admin setup.Long Range Wireless Access Point / Client Bridge Version 1. SNMP. enter the IP address of the device (default: 192. Refer to Chapter 2 in order to configure the IP address of your computer. firmware upgrade. basic.168. The navigation drop-down menu on left is divided into four sections: Status: Displays the overall status. advanced. 2.

You will then see three options: Main. Main Click on the Main link under the Status drop-down menu. Information such as operating mode.0 Status Click on the Status link on the navigation dropdown menu. firmware version. 14 . LAN IP address. The status that is displayed corresponds with the operating mode that is selected. In the ‘Wireless section. Each option is described in detail below. subnet mask. Wireless Client List. channel is displayed. serial number. kernel version and application version are displayed in the ‘System’ section.Long Range Wireless Access Point / Client Bridge Version 1. and System Log. Since this device supports multiple-SSIDs. the frequency. and MAC address are displayed in the ‘LAN’ section. such as ESSID and its security settings are displayed. the details of each SSID. system up time.

logs of older events are deleted. If there is not enough internal memory for all events. The device automatically logs (records) events of possible interest in its internal memory.Long Range Wireless Access Point / Client Bridge Version 1. 15 . Click on the Refresh button to refresh the client list System Log Click on the System Log link under the Status drop-down menu. This page displays the list of Clients that are associated to the Access Point. but logs of the latest events are retained. The MAC addresses and signal strength for each client is displayed.0 Wireless Client List Click on the Wireless Client List link under the Status drop-down menu.

Operating Mode: Select and operating mode. This page allows you to switch the operating mode of the device. Each option is described in detail below. Device Name: Specify a name for the device (this is not the SSID).0 System Click on the System link on the navigation drop-down menu.Long Range Wireless Access Point / Client Bridge Version 1. Country/Region: Select a country from the drop-down list. as well as specify a name and select the operating region. Configuration for each operating mode is described in their respective chapters. This will allow the Access 16 . Click on the Apply button to save the changes. You will then see three options: System Properties. IP Network Setting: Select Obtain an IP address automatically (DHCP) radio button if the Access Point is connected to a DHCP server. System Properties Click on the System Properties link under the System drop-down menu. IP Settings. IP Settings Click on the IP Settings link under the System drop-down menu This page allows you to configure the device with a static IP address or a DHCP client. and Spanning Tree Settings.

Long Range Wireless Access Point / Client Bridge

Version 1.0

Point to pass IP addresses to the clients associated with it. You may select Specify an IP Address radio button if you would like the device to use a static IP address. In this case, you would be required to specify an IP address, subnet mask, and default gateway IP address. IP Address: Specify an IP address IP Subnet Mask: Specify the subnet mask for the IP address Default Gateway: Specify the IP address of the default gateway. Click on the Apply button to save the changes.

Spanning Tree Settings
Click on the Spanning Tree link under the System drop-down menu Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network.

Spanning Tree Status: Choose to enable or disable the spanning tree feature. Bridge Hello Time: Specify the number of seconds for the hello time. Bridge Max Age: Specify the number of seconds for the max age. Bridge Forward Delay: Specify the number of seconds for the bridge forward delay. Priority: Specify the number of seconds for the priority. Click on the Apply button to save the changes.

17

Long Range Wireless Access Point / Client Bridge

Version 1.0

Wireless
Click on the Wireless link on the navigation drop-down menu. You will then see four options: wireless network, wireless MAC filter, WDS link settings, and wireless advanced settings. Each option is described below.

Wireless Network
The Wireless Network page allows you to configure the wireless mode, channel, SSID, and security settings.

Wireless Mode: Depending on the type of wireless clients that are connected to the network, you may select B, G, B/G-mixed or Super-G. If you are not sure about which clients will be accessing the wireless networks, it is recommended that you select B/G-mixed for the best performance. Super-G is a proprietary mode which combines all channels into a single channel to maximize the through-put up to 200%. Please be aware that Super-G works only with other Super-G supported devices. Channel: Select a channel from the drop-down list. The channels available are based on the country’s regulation. When selecting Infrastructure mode, a channel is not required, however, when selecting Adhoc mode, you must select the same channel on all points.

Wireless Security - WEP
Security Mode: Select WEP from the drop-down list if your wireless network uses WEP encryption. WEP is an acronym for Wired Equivalent Privacy, and is a security
18

Long Range Wireless Access Point / Client Bridge

Version 1.0

protocol that provides the same level of security for wireless networks as for a wired network.

Authentication Type: Select an authentication method. Options available are Open Key, Shared Key or Auto. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. All authentication packets are transmitted without encryption. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the Access Point. The device requesting authentication encrypts the challenge text and sends it back to the Access Point. If the challenge text is encrypted correctly, the Access Point allows the requesting device to authenticate. It is recommended to select Auto if you are not sure which authentication type is used. Input Type: Select He or ASCII from the drop-down list Key Length: Select a key format from the drop-down list. 64bit-hex keys require 10 characters, where as 128-bit keys require 26 characters. A hex key is defined as a number between 0 through 9 and letter between A through F. Default Key: You may use up to four different keys for four different networks. Select the current key that will be used. Key 1-4: You may enter four different WEP keys. Click on the Apply button to save the changes.

Wireless Security – WPA-PSK, WPA2-PSK, WPA-Mixed
Security Mode: Select WPA-PSK, WPA2-PSK, or WPA-Mixed from the drop-down list if your wireless network uses WPA pre-shared key.
19

Long Range Wireless Access Point / Client Bridge Version 1. which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven’t been tampered with. Group Key Update Interval: Specify the number of seconds after which the Access Point will probe the client for the passphrase. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. Wireless Security – WPA. Passphrase: Specify a passphrase that is shared amongst the Access Points and clients. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy).0 Encryption: Select TKIP or AES from the drop-down list if your wireless network uses this encryption. WPA2 Security Mode: Select WPA or WPA2 from the drop-down list if your wireless network uses WPA. which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven’t been tampered with. WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. 20 . Click on the Apply button to save the changes. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP).

The default is usually 1812. By selecting Allow MAC 21 .Long Range Wireless Access Point / Client Bridge Version 1. or Deny Listed MAC addresses from associating with the network. RADIUS Port: Enter the port number of the RADIUS server.0 Encryption: Select TKIP or AES from the drop-down list if your wireless network uses this encryption. Group Key Update Interval: Specify the number of seconds after which the Access Point will probe the client for the secret. Allow Listed. ACL (Access Control) Mode: You may choose to Disable. RADIUS Secret: Enter the shared password of the RADIUS server. On this page you can filter the MAC address by allowing or blocking access the network. Click on the Apply button to save the changes. RADIUS IP Address: Enter the IP address of the RADIUS server. Wireless MAC Filter Click on the Wireless MAC Filter link under the Wireless menu.

selected Deny MAC in the List.0 in the List.Long Range Wireless Access Point / Client Bridge Version 1. Click on the Apply button to save the changes. This feature can be helpful in restricting the coverage area of the wireless network. you may delete selected MAC address or delete all the addresses from the table by clicking on the Delete button. fragmentation threshold. On the other hand. transmit power. only the listed MAC addresses will be blocked from accessing the network. Data Rate: If you would like to force a data rate. Wireless Advanced Settings Click on the Wireless Advanced Settings link. The table only for 11g and 11b/g mix mode 6M-24M ˇ ˇ ˇ Great 36M ˇ ˇ Great N/A 48M ˇ Great NA N/A 54M Great N/A N/A N/A High Ultra High Super Extreme Fragment: Packets over the specified size will be fragmented in order to improve performance on noisy networks. protection mode and distance. However. You can arrange the different data rate in distance in Access Point mode. only the address listed in the table will have access to the network. all other clients will have access to the network. Please refer below table. On this page you can configure the advanced settings to tweak the performance of your wireless network. all other clients will be blocked. Options available are: data rate. This table lists the blocked or allowed MAC addresses. Transmit Power: You may have the different application distance of the device by selecting a value from the drop-down list. you may select one from the dropdown list. 22 . RTS threshold. MAC Address: Enter the MAC address. for best performance it is recommended to use the Auto setting.

23 .0 RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance.11g devices.g devices then it is recommended to enable this feature so that the 802. Click on the Apply button to save the changes. WMM: Enable wireless Quality of Service Distance (1-30km): Specify a distance between 1 and 30Km.11b and 802.11b devices will not degrade the performance of 802. Protection Mode: If your wireless network is using both 802.Long Range Wireless Access Point / Client Bridge Version 1.

This is a networking management protocol used to monitor network-attached devices. Administration Click on the Administration link under the Management menu. Name: Specify a user name into the first field. Click on the Apply button to save the changes. SNMP allows messages (called protocol data units) to be sent to various parts of a network. Password: Specify a password into this field and then re-type the password into the Confirm Password field. For security reasons it is highly recommended that you create a new user name and password. .0 Management Click on the Management link on the navigation drop-down menu. SNMP-compatible devices (called agents) return data stored in their Management Information Bases. this device is configured without a user name and password admin. This option allows you to create a user name and password for the device. and log. This option allows you to assign the contact details. time settings. SNMP Settings Click on the SNMP Settings link under the Management menu. Upon receiving these messages. By default.Long Range Wireless Access Point / Client Bridge Version 1. You will then see seven options: administration. firmware upgrade. backup/restore settings. SNMP settings. location. community name and trap settings for SNMP. Each option is described below. 24 .

Send SNMP Trap: Specify the IP address of the computer that will receive the SNMP traps.0 SNMP Enable/Disable: Choose to enable or disable the SNMP feature. Contact: Specify the contact details of the device. Read-Only Community Name: Specify the password for access the SNMP community for read only access. This option is used to save the current settings of the device in a file on your local disk or load settings on to the device from a local disk. Click on the Apply button to save the changes. Trap Community Name: Specify the password for the SNMP trap community.Long Range Wireless Access Point / Client Bridge Version 1. 25 . This feature is very handy for administrators who have several devices that need to be configured with the same settings. Save a copy of the current settings: Click on the Backup button to save the current configuration. Location: Specify the location of the device. Reset to factory default settings Click on the Backup/Restore Setting link under the Management menu. Read-Write Community Name: Specify the password for access to the SNMP community with read/write access. Backup/Restore settings.

you may restore it by clicking on the Browse button to select the file. Please wait while the device restart and then access the device using the default IP address: 192. This page is used to upgrade the firmware on the device. Make sure that downloaded the appropriate firmware from your vendor.Long Range Wireless Access Point / Client Bridge Version 1.168.1. Note: The upgrade process may take about 1 minute to complete.1 Firmware Upgrade Click on the Upgrade Firmware link under the Management menu. 26 . Revert to factory default settings: Click on the Factory Default Settings button to reset the device to the default settings. Click on the Browse button and then select the appropriate firmware and then click on the Upgrade button.0 Restore saved settings from a file: Once a file has been backed up. The device will restart automatically once the upgrade is complete. and then the Restore button. Do not power off the device during this process as it may crash the device and make it unusable.

Log Click on the Log link under the Management menu. 27 . Manually Set Date and Time: Specify the date and time Automatically Get Date and Time: Select the time zone from the drop down list and then specify the IP address of the NTP server. Local Log: Choose to enable or disable the local log. The Log page displays a list of events that are triggered on the Ethernet and Wireless interface. You may do this manually or by connecting to a NTP server.0 Time Settings Click on the Time Settings link under the Management menu. Syslog: Choose to enable or disable the system log. This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes. This page allows you to configure the time on the device. Click on the Apply button to save the changes. Log Server IP Address: Specify the IP address of the server that will receive the system log. Click on the Apply button to save the changes.Long Range Wireless Access Point / Client Bridge Version 1.

After logging in you will graphical user interface (GUI) of the device. IP and Spanning Tree settings. the web-browser will display the login page. enter the IP address of the device (default: 192. 4.Long Range Wireless Access Point / Client Bridge Version 1. 1.1 Logging In To configure the device through the web-browser. SNMP. 28 .1. advanced. 2. Refer to Chapter 2 in order to configure the IP address of your computer. Management: This menu includes the admin setup. The navigation drop-down menu on left is divided into four sections: Status: Displays the overall status. Wireless: This menu includes status. After connecting to the IP address. basic. Make sure that the device and your computers are configured on the same subnet.0 5 Client Bridge Operating Mode 5. and save/restore backup. connection status.168. System: This menu includes the system properties. firmware upgrade. and security. 3. and event log. Specify admin for both the user name and password.1) into the address bar of the web-browser and press Enter.

You will then see three options: Main.Long Range Wireless Access Point / Client Bridge Version 1.0 5. the details of each SSID. such as ESSID and its security settings are displayed. and MAC address are displayed in the ‘LAN’ section. The status that is displayed corresponds with the operating mode that is selected. serial number. subnet mask. Connection Status.1 Main Click on the Main link under the Status drop-down menu. Information such as operating mode.2. the frequency. Since this device supports multiple-SSIDs. 29 . channel is displayed. LAN IP address. system up time. kernel version and application version are displayed in the ‘System’ section. In the ‘Wireless section. Each option is described in detail below.2 Status Click on the Status link on the navigation drop-down menu. firmware version. and System Log. 5.

This page displays the current status of the network. logs of older events are deleted.2 Connection Status Click on the Connection Status link under the Status drop-down menu. The device automatically logs (records) events of possible interest in its internal memory. but logs of the latest events are retained. security. connection status.2.3 System Log Click on the System Log link under the Status drop-down menu. current channel.0 5. SSID. including network type. data rate.2. 30 . wireless mode. noise level and signal strength.Long Range Wireless Access Point / Client Bridge Version 1. 5. If there is not enough internal memory for all events. BSSID.

This page allows you to switch the operating mode of the device.0 5. Operating Mode: Select and operating mode. Click on the Apply button to save the changes. Country/Region: Select a country from the drop-down list.2 IP Settings Click on the IP Settings link under the System drop-down menu This page allows you to configure the device with a static IP address or a DHCP client. as well as specify a name and select the operating region. 5.1 System Properties Click on the System Properties link under the System drop-down menu. Configuration for each operating mode is described in their respective chapters. 31 . Each option is described in detail below.3 System Click on the System link on the navigation drop-down menu. IP Settings. 5.3.Long Range Wireless Access Point / Client Bridge Version 1. Device Name: Specify a name for the device (this is not the SSID). You will then see three options: System Properties.3. and Spanning Tree Settings.

Bridge Forward Delay: Specify the number of seconds for the bridge forward delay.0 IP Network Setting: Select Obtain an IP address automatically (DHCP) radio button if the Access Point is connected to a DHCP server. 5.3 Spanning Tree Settings Click on the Spanning Tree link under the System drop-down menu Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network. Click on the Apply button to save the changes. Bridge Hello Time: Specify the number of seconds for the hello time.3.Long Range Wireless Access Point / Client Bridge Version 1. Priority: Specify the number of seconds for the priority. Click on the Apply button to save the changes. subnet mask. You may select Specify an IP Address radio button if you would like the device to use a static IP address. Spanning Tree Status: Choose to enable or disable the spanning tree feature. Bridge Max Age: Specify the number of seconds for the max age. and default gateway IP address. you would be required to specify an IP address. This will allow the Access Point to pass IP addresses to the clients associated with it. IP Address: Specify an IP address IP Subnet Mask: Specify the subnet mask for the IP address Default Gateway: Specify the IP address of the default gateway. In this case. 32 .

33 . If you are not sure about which clients will be accessing the wireless networks. wireless security. and wireless advanced settings. Site Survey: Click on the Site Survey button in order to scan the 2.1 Wireless Network The Wireless Network page allows you to configure the wireless mode.0 5. G. Each option is described below. Click on the Refresh button to re-scan the frequency.4. or B/G-mixed. you may select B. it is recommended that you select B/Gmixed for the best performance. You will then see three options: wireless network. and security settings. SSID. SSID: The SSID is a unique named shared amongst all the points of the wireless network. Click on the BSSID link to connect to the Access Point.4 Wireless Click on the Wireless link on the navigation drop-down menu. 5. You may specify an SSID or select one from the Site Survey. channel. Wireless Mode: Depending on the type of wireless clients that are connected to the network. The SSID must be identical on all points of the wireless network and cannot exceed 32 characters.Long Range Wireless Access Point / Client Bridge Version 1.4GHz frequency for devices that broadcast their SSID.

Key 1-4: You may enter four different WEP keys. The device requesting authentication encrypts the challenge text and sends it back to the Access Point. the Access Point allows the requesting device to authenticate. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the Access Point.WEP Security Mode: Select WEP from the drop-down list if your wireless network uses WEP encryption.2 Wireless Security . It is recommended to select Auto if you are not sure which authentication type is used. A hex key is defined as a number between 0 through 9 and letter between A through F. Shared Key or Auto. Click on the Apply button to save the changes. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. Authentication Type: Select an authentication method. WEP is an acronym for Wired Equivalent Privacy. Input Type: Select He or ASCII from the drop-down list Key Length: Select a key format from the drop-down list. 64bit-hex keys require 10 characters. If the challenge text is encrypted correctly.Long Range Wireless Access Point / Client Bridge Version 1. where as 128-bit keys require 26 characters.0 5. Default Key: You may use up to four different keys for four different networks.4. Select the current key that will be used. 34 . All authentication packets are transmitted without encryption. Options available are Open Key. and is a security protocol that provides the same level of security for wireless networks as for a wired network.

Options available are: data rate. RTS threshold. However.3 Wireless Security – WPA-PSK. 35 .4.0 5. Click on the Apply button to save the changes. transmit power. WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP). you may select one from the dropdown list. protection mode and distance. which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven’t been tampered with. fragmentation threshold. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). On this page you can configure the advanced settings to tweak the performance of your wireless network. WPA2-PSK. Security Mode: Select WPA-PSK. Encryption: Select TKIP or AES from the drop-down list if your wireless network uses this encryption.4. Passphrase: Specify a passphrase that is shared amongst the Access Points and clients. or WPA2-PSK from the drop-down list if your wireless network uses WPA pre-shared key. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP.4 Wireless Advanced Settings Click on the Wireless Advanced Settings link. for best performance it is recommended to use the Auto setting. 5.Long Range Wireless Access Point / Client Bridge Version 1. Data Rate: If you would like to force a data rate.

1 Administration Click on the Administration link under the Management menu. Distance (1-30km): Specify a distance between 1 and 30Km.11g devices.11b and 802. Click on the Apply button to save the changes.Long Range Wireless Access Point / Client Bridge Version 1. and log. backup/restore settings. This option allows you to create a user name and password for the device. Protection Mode: If your wireless network is using both 802. 36 .5 Management Click on the Management link on the navigation drop-down menu. 5. You will then see six options: administration. By default. firmware upgrade. SNMP settings. Please refer below table.g devices then it is recommended to enable this feature so that the 802. time settings.11b devices will not degrade the performance of 802. You can arrange the different data rate in distance in Access Point mode. For security reasons it is highly recommended that you create a new user name and password. The table only for 11g and 11b/g mix mode 6M-24M ˇ ˇ ˇ Great 36M ˇ ˇ Great N/A 48M ˇ Great NA N/A 54M Great N/A N/A N/A High Ultra High Super Extreme Fragment: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Each option is described below.5.0 Transmit Power: You may have the different application distance of the device by selecting a value from the drop-down list. This feature can be helpful in restricting the coverage area of the wireless network. RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. 5. this device is configured without a user name and password admin.

This option allows you to assign the contact details. Contact: Specify the contact details of the device. Click on the Apply button to save the changes. 5.0 Name: Specify a user name into the first field. Read-Only Community Name: Specify the password for access the SNMP community for read only access.5. This is a networking management protocol used to monitor network-attached devices. Trap Community Name: Specify the password for the SNMP trap community. SNMP-compatible devices (called agents) return data stored in their Management Information Bases. Read-Write Community Name: Specify the password for access to the SNMP community with read/write access. Click on the Apply button to save the changes.Long Range Wireless Access Point / Client Bridge Version 1.2 SNMP Settings Click on the SNMP Settings link under the Management menu. Location: Specify the location of the device. location. . 37 . SNMP Enable/Disable: Choose to enable or disable the SNMP feature. SNMP allows messages (called protocol data units) to be sent to various parts of a network. Send SNMP Trap: Specify the IP address of the computer that will receive the SNMP traps. community name and trap settings for SNMP. Password: Specify a password into this field and then re-type the password into the Confirm Password field. Upon receiving these messages.

Long Range Wireless Access Point / Client Bridge Version 1.3 Backup/Restore settings.5. Please wait while the device restart and then access the device using the default IP address: 192. Make sure that downloaded the appropriate firmware from your vendor.4 Firmware Upgrade Click on the Upgrade Firmware link under the Management menu. and then the Restore button.5. This option is used to save the current settings of the device in a file on your local disk or load settings on to the device from a local disk.1. Revert to factory default settings: Click on the Factory Default Settings button to reset the device to the default settings. Restore saved settings from a file: Once a file has been backed up.1 5.0 5. you may restore it by clicking on the Browse button to select the file. Save a copy of the current settings: Click on the Backup button to save the current configuration. This feature is very handy for administrators who have several devices that need to be configured with the same settings. Reset to factory default settings Click on the Backup/Restore Setting link under the Management menu. 38 . This page is used to upgrade the firmware on the device.168.

The device will restart automatically once the upgrade is complete.5. 5. Manually Set Date and Time: Specify the date and time Automatically Get Date and Time: Select the time zone from the drop down list and then specify the IP address of the NTP server.5 Time Settings Click on the Time Settings link under the Management menu. This page allows you to configure the time on the device. The Log page displays a list of events that are triggered on the Ethernet and Wireless interface. Do not power off the device during this process as it may crash the device and make it unusable.6 Log Click on the Log link under the Management menu. Note: The upgrade process may take about 1 minute to complete.5. 39 . 5. You may do this manually or by connecting to a NTP server. This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes.Long Range Wireless Access Point / Client Bridge Version 1. Click on the Apply button to save the changes.0 Click on the Browse button and then select the appropriate firmware and then click on the Upgrade button.

0 Syslog: Choose to enable or disable the system log.Long Range Wireless Access Point / Client Bridge Version 1. Log Server IP Address: Specify the IP address of the server that will receive the system log. Local Log: Choose to enable or disable the local log. 40 . Click on the Apply button to save the changes.

and event log. firmware upgrade. Wireless: This menu includes status. enter the IP address of the device (default: 192. 4. 3.Long Range Wireless Access Point / Client Bridge Version 1. After connecting to the IP address. connection status. After logging in you will graphical user interface (GUI) of the device. basic. advanced. Management: This menu includes the admin setup. 1. The navigation drop-down menu on left is divided into four sections: Status: Displays the overall status.168.0 6 Client Router Operating Mode 6. and save/restore backup. SNMP.1 Logging In To configure the device through the web-browser. Router: This includes WAN. 5.1) into the address bar of the web-browser and press Enter. Make sure that the device and your computers are configured on the same subnet. Refer to Chapter 2 in order to configure the IP address of your computer. 2. 41 . System: This menu includes the system properties. IP and Spanning Tree settings. the web-browser will display the login page. LAN. Specify admin for both the user name and password.1. and VPN settings. and security.

Each option is described in detail below.2 Status Click on the Status link on the navigation drop-down menu. Connection Status. the details of each SSID. channel is displayed. Information such as operating mode. subnet mask.2. You will then see three options: Main. connection type. the frequency.1 Main Click on the Main link under the Status drop-down menu. Since this device supports multiple-SSIDs. IP address. 6. interface. In the ‘Wireless section. and MAC address are displayed in the ‘LAN’ section. LAN IP address. such as ESSID and its security settings are displayed. and subnet mask. firmware version. 42 . The status that is displayed corresponds with the operating mode that is selected. kernel version and application version are displayed in the ‘System’ section. serial number. system up time. The ‘WAN” section displays the MAC address.Long Range Wireless Access Point / Client Bridge Version 1.0 6. and System Log.

43 . If there is not enough internal memory for all events.2. BSSID. This page displays the current status of the network.Long Range Wireless Access Point / Client Bridge Version 1. 6. noise level and signal strength. but logs of the latest events are retained.2. logs of older events are deleted.2 Connection Status Click on the Connection Status link under the Status drop-down menu. connection status. current channel.3 System Log Click on the System Log link under the Status drop-down menu.0 6. data rate. SSID. including network type. security. The device automatically logs (records) events of possible interest in its internal memory. wireless mode.

6. Configuration for each operating mode is described in their respective chapters.1 WAN Settings Click on the WAN Settings link under the Router drop-down menu.3. as well as specify a name and select the operating region. LAN settings. This page allows you to switch the operating mode of the device. or PPPoE. Device Name: Specify a name for the device (this is not the SSID). Operating Mode: Select and operating mode. which is described below. Country/Region: Select a country from the drop-down list.1 System Properties Click on the System Properties link under the System drop-down menu.4 Router Click on the Router link on the navigation drop-down menu. 6.3 System Click on the System link on the navigation drop-down menu. This page allows you to configure the WAN interface as DHCP. and VPN Pass Through. Click on the Apply button to save the changes.4.Long Range Wireless Access Point / Client Bridge Version 1.0 6. Each section is described in detail below. You will then see three options: WAN settings. Static IP. 44 . 6. You will then see System Properties setting.

45 .4. you should set this to match the MTU of the connection to your ISP. packets will be fragmented downstream. Account Name: Specify an account name if your ISP has provided you with one. If the router's MTU is set too high. If LAN devices send larger packets. Router MAC Address: If you need to change the MAC address of the router’s WAN interface. Internet Connection Type: Select the DHCP from the drop-down list. either type in an alternate MAC address (for example.Long Range Wireless Access Point / Client Bridge Version 1. network performance can suffer. Domain Name Service: Select Get Automatically from ISP if the ISP will provide the DNS address. MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. the router will break them into smaller packets. if not.1 WAN . Domain Name: Specify a domain name if the ISP has provided you with one. This is also known as Dynamic IP.DHCP The WAN interface can be configured as a DHCP Client in which the ISP provides the IP address to the device. select Use these DNS servers and specify the primary and secondary DNS server IP address. the MAC address of the router initially connected to the ISP) or click on the Clone MAC button.0 6. Ideally. Click on the Apply button to save the changes. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. In either case.1. If the router's MTU is set too low. the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections.

Long Range Wireless Access Point / Client Bridge Version 1. Subnet Mask: Specify the subnet mask for this IP address. In this type of connection.2 WAN – Static IP The WAN interface can be configured as Static IP address. Internet Connection Type: Select the Static IP from the drop-down list. IP Address: Specify the IP address for this device. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. Default Gateway: Specify the IP address of the default gateway. which is assigned by your ISP. MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. network performance can suffer. If the router's MTU is set too low. which is assigned by your ISP. your ISP provides you with a dedicated IP address (which does not change as DHCP). If LAN devices send larger packets.0 6. the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections. Account Name: Specify an account name if your ISP has provided you with one.1. Domain Name: Specify a domain name if the ISP has provided you with one. which is assigned by your ISP. Ideally. 46 . In either case. the router will break them into smaller packets. If the router's MTU is set too high.4. you should set this to match the MTU of the connection to your ISP. packets will be fragmented downstream.

4. Internet Connection Type: Select PPPoE from the drop-down list. network performance can suffer. Password: Specify the password which is provided by your ISP. if not. Click on the Apply button to save the changes. the MAC address of the router initially connected to the ISP) or click on the Clone MAC button. If the router's MTU is set too high. 6. the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections. packets will be fragmented downstream.0 Domain Name Service: Select Get Automatically from ISP if the ISP will provide the DNS address.3 WAN – PPPoE The WAN interface can be configured as PPPoE. This type of connection is usually used for a DSL service and requires a username and password to connect. Ideally. 47 . either type in an alternate MAC address (for example. you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. the router will break them into smaller packets. Router MAC Address: If you need to change the MAC address of the router’s WAN interface. In either case. If the router's MTU is set too low.1. If LAN devices send larger packets.Long Range Wireless Access Point / Client Bridge Version 1. and then verify it once again in the next field. Login: Specify the user name which is provided by your ISP. select Use these DNS servers and specify the primary and secondary DNS server IP address. MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN.

and wireless advanced settings. 48 .Long Range Wireless Access Point / Client Bridge Version 1. Domain Name Service: Select Get Automatically from ISP if the ISP will provide the DNS address. IPSec Pass Through: Place a check in this box if you would like to enable this pass through. if not. Layer 2 Tunneling Protocol is a transport protocol that enables tunneling through the Internet for the establishment of virtual private networks.0 Service Name: Specify the name of the ISP. Connect on Demand: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. wireless security.1 Wireless Network The Wireless Network page allows you to configure the wireless mode.4. Type: Select a reconnection type: Keep Alive (A connection to the Internet is always maintained). 6. SSID. channel. Click on the Apply button to save the changes. and security settings.2 VPN Pass Through Click on the VPN Pass Through link under the Router drop-down menu. select Use these DNS servers and specify the primary and secondary DNS server IP address. 6. This page allows you to enable the pass through feature.5. Each option is described below. PPTP Pass Through: Place a check in this box if you would like to enable this pass through. You will then see three options: wireless network. 6. Click on the Apply button to save the changes.5 Wireless Click on the Wireless link on the navigation drop-down menu. PPTP is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" L2TP Pass Through: Place a check in this box if you would like to enable this pass through. IPSec is a VPN protocol used to implement secure exchange of packets at the IP layer.

5. you may select B.4GHz frequency for devices that broadcast their SSID. 49 .1. Click on the Refresh button to re-scan the frequency.1 Wireless Security . or B/G-mixed. WEP is an acronym for Wired Equivalent Privacy. Click on the BSSID link to connect to the Access Point.0 Wireless Mode: Depending on the type of wireless clients that are connected to the network.WEP Security Mode: Select WEP from the drop-down list if your wireless network uses WEP encryption. G.Long Range Wireless Access Point / Client Bridge Version 1. If you are not sure about which clients will be accessing the wireless networks. 6. Site Survey: Click on the Site Survey button in order to scan the 2. SSID: The SSID is a unique named shared amongst all the points of the wireless network. You may specify an SSID or select one from the Site Survey. it is recommended that you select B/Gmixed for the best performance. and is a security protocol that provides the same level of security for wireless networks as for a wired network. The SSID must be identical on all points of the wireless network and cannot exceed 32 characters.

where as 128-bit keys require 26 characters. All authentication packets are transmitted without encryption. Input Type: Select He or ASCII from the drop-down list Key Length: Select a key format from the drop-down list. It is recommended to select Auto if you are not sure which authentication type is used.2 Wireless Security – WPA-PSK. Security Mode: Select WPA-PSK. 50 .Long Range Wireless Access Point / Client Bridge Version 1. or WPA2-PSK from the drop-down list if your wireless network uses WPA pre-shared key. Click on the Apply button to save the changes. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the Access Point. Shared Key or Auto. WPA2-PSK. Select the current key that will be used. 6. the Access Point allows the requesting device to authenticate. Key 1-4: You may enter four different WEP keys. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. Default Key: You may use up to four different keys for four different networks. If the challenge text is encrypted correctly. Options available are Open Key.0 Authentication Type: Select an authentication method. 64bit-hex keys require 10 characters. The device requesting authentication encrypts the challenge text and sends it back to the Access Point.1. A hex key is defined as a number between 0 through 9 and letter between A through F.5.

The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP). protection mode and distance. However. RTS threshold. Options available are: data rate. 6. 51 . This feature can be helpful in restricting the coverage area of the wireless network.Long Range Wireless Access Point / Client Bridge Version 1. fragmentation threshold. Passphrase: Specify a passphrase that is shared amongst the Access Points and clients. for best performance it is recommended to use the Auto setting. which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven’t been tampered with.2 Wireless Advanced Settings Click on the Wireless Advanced Settings link. Data Rate: If you would like to force a data rate. On this page you can configure the advanced settings to tweak the performance of your wireless network. transmit power. Click on the Apply button to save the changes.5. Transmit Power: You may have the different application distance of the device by selecting a value from the drop-down list. you may select one from the dropdown list.0 Encryption: Select TKIP or AES from the drop-down list if your wireless network uses this encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy).

RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance.11g devices. You will then see six options: administration. For security reasons it is highly recommended that you create a new user name and password. Please refer below table.11b devices will not degrade the performance of 802. 5.g devices then it is recommended to enable this feature so that the 802. Click on the Apply button to save the changes. this device is configured without a user name and password admin. By default. time settings.5.6 Management Click on the Management link on the navigation drop-down menu. SNMP settings. 52 . This option allows you to create a user name and password for the device.Long Range Wireless Access Point / Client Bridge Version 1.0 You can arrange the different data rate in distance in Access Point mode.11b and 802. backup/restore settings. 6. firmware upgrade. and log. The table only for 11g and 11b/g mix mode High Ultra High Super Extreme 6M-24M ˇ ˇ ˇ Great 36M ˇ ˇ Great N/A 48M ˇ Great NA N/A 54M Great N/A N/A N/A Fragment: Packets over the specified size will be fragmented in order to improve performance on noisy networks.7 Administration Click on the Administration link under the Management menu. Protection Mode: If your wireless network is using both 802. Each option is described below. WMM: Enable wireless Quality of Service Distance (1-30km): Specify a distance between 1 and 30Km.

Web Access: Select normal web access HTTP or secured web access HTTPS. For example.5. community name and trap settings for SNMP. This is a networking management protocol used to monitor network-attached devices. Password: Specify a password into this field and then re-type the password into the Confirm Password field.1:8080 to connect to the web interface of the device. .1. if you specify 8080. Remote Management Port: Specify a port for remote management. Remote Management: Choose to enable or disable remote management.8 SNMP Settings Click on the SNMP Settings link under the Management menu. 5.0 Name: Specify a user name into the first field. SNMP-compatible devices (called agents) return data stored in their Management Information Bases. SNMP allows messages (called protocol data units) to be sent to various parts of a network.Long Range Wireless Access Point / Client Bridge Version 1. Upon receiving these messages. Remote Upgrade: Choose to enable or disable remote firmware upgrade. This option allows you to assign the contact details. location. Click on the Apply button to save the changes. 53 . then you will need to specify <ip address>:<port> 192.168.

This option is used to save the current settings of the device in a file on your local disk or load settings on to the device from a local disk. This feature is very handy for administrators who have several devices that need to be configured with the same settings. 54 . Send SNMP Trap: Specify the IP address of the computer that will receive the SNMP traps. Contact: Specify the contact details of the device. Trap Community Name: Specify the password for the SNMP trap community. Click on the Apply button to save the changes. Read-Write Community Name: Specify the password for access to the SNMP community with read/write access.Long Range Wireless Access Point / Client Bridge Version 1. 5. Location: Specify the location of the device.5. Save a copy of the current settings: Click on the Backup button to save the current configuration.9 Backup/Restore settings.0 SNMP Enable/Disable: Choose to enable or disable the SNMP feature. Reset to factory default settings Click on the Backup/Restore Setting link under the Management menu. Read-Only Community Name: Specify the password for access the SNMP community for read only access.

Do not power off the device during this process as it may crash the device and make it unusable.10 Firmware Upgrade Click on the Upgrade Firmware link under the Management menu. This page is used to upgrade the firmware on the device.5. 55 . Note: The upgrade process may take about 1 minute to complete. Revert to factory default settings: Click on the Factory Default Settings button to reset the device to the default settings.1. The device will restart automatically once the upgrade is complete. you may restore it by clicking on the Browse button to select the file.168.Long Range Wireless Access Point / Client Bridge Version 1.1 5. and then the Restore button.11 Time Settings Click on the Time Settings link under the Management menu. Make sure that downloaded the appropriate firmware from your vendor. Please wait while the device restart and then access the device using the default IP address: 192.0 Restore saved settings from a file: Once a file has been backed up. Click on the Browse button and then select the appropriate firmware and then click on the Upgrade button. This page allows you to configure the time on the device. You may do this manually or by connecting to a NTP server.5. 5.

This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes. Local Log: Choose to enable or disable the local log.Long Range Wireless Access Point / Client Bridge Version 1. Click on the Apply button to save the changes. 56 . Click on the Apply button to save the changes. 5.0 Manually Set Date and Time: Specify the date and time Automatically Get Date and Time: Select the time zone from the drop down list and then specify the IP address of the NTP server. Log Server IP Address: Specify the IP address of the server that will receive the system log. The Log page displays a list of events that are triggered on the Ethernet and Wireless interface.12 Log Click on the Log link under the Management menu.5. Syslog: Choose to enable or disable the system log.

16-QAM.412~2.472 25dBm@36Mbps ETSI Frequency Power 26dBm@6~24Mbps 802.11b -97 dBm @ 1Mbps -89 dBm @ 11Mbps 57 .462 25dBm@36Mbps GHz 23dBm@48Mbps IEEE802.11g 22dBm@54Mbps 27dBm@1~11Mbps GHz 23dBm@48Mbps Power 26dBm@6~24Mbps 2.412~2. 64-QAM DSSS = DBPSK.11b/g 11 for North America.412~2. CCK 802.0 Appendix A – Specifications Hardware Specification MCU/RF Memory Flash Physical Interface Atheros AR2316 Single chip 32MB SDRAM 8MB One 10/100 Fast Ethernet RJ-45 Reset Button One SMA Connector One switch (external and internal antenna switching) LED indicators Power/ Status LAN (10/100Mbps) WLAN (Wireless is up) 3 x Link Quality (Client Bridge mode) Green: Good Quality Yellow: Marginally Acceptable Quality Red: Bad Quality Power Requirements Regulation Certifications Active Ethernet (Power over Ethernet) Proprietary PoE design Power Adapter 24 V/0.11b/g 2.462 27dBm@1~11Mbps 2.472GHz OFDM = BPSK. EN 300 328/EN 301 489-1/-17 RF Specification Frequency Band Modulation Technology Operating Channels Receive Sensitivity (Typical) Available transmit power (Average power) FCC Frequency 2.472 IEEE802. 14 for Japan.412~2.8A DC FCC Part 15C/15B. DQPSK.Long Range Wireless Access Point / Client Bridge Version 1.11g 22dBm@54Mbps 2.11g -92 dBm @ 6Mbps -74 dBm @ 54Mbp 802. QPSK.412~2. 13 for Europe 802.

2.3 (Ethernet) IEEE 802.Keep latest setting when f/w update Administrator password change .3u (Fast Ethernet) IEEE 802.0 GHz IEEE802. 6. 1 in Mbps Long distance transmission : 1km to 30km Transmit power table Signal Strength indication using LEDs Security WEP Encryption-64/128/152 bit WPA/WPA2 Personal (WPA-PSK using TKIP or AES) WPA/WPA2 Enterprise (WPA-EAP using TKIP) 802.5. 36.Upgrade firmware via web-browser .11b Tolerance ±1 dBm GHz IEEE802.11b/g (2.Reboot (Press 1 second) . 24. 48. Event Log 58 WMM .11 b/g Access Point Client Bridge Client Router LAN VPN Wireless DHCP Server DHCP Client VPN – pass through Channel Selection (Setting varies by countries) Transmission Rate 11 b/g:54. 5. 9.4GHz WLAN) Operation Mode 802. 12.11b Tolerance ±1 dBm Internal Antenna External Antenna Embedded 10dBi Panel antenna 1* SMA connector Software Features General Topology Protocol / Standard Infrastructure IEEE 802.1x Authenticator Hide SSID in beacons L2 isolation(AP mode) Wireless STA (Client) connected list Web-redirect QoS Management Configuration Firmware Upgrade Administrator Setting Reset Setting System monitoring Web-based configuration (HTTP) . 11.Reset to Factory Default (Press 5 seconds) Status. 18.Multi-Function Gigabit Wireless-N Client Bridge Version 1.

0 SNMP MIB Backup & Restore Time setting V1.Multi-Function Gigabit Wireless-N Client Bridge Version 1. V2c (Phase 2) MIB I. MIB II (RFC1213) and Private MIB Settings through Web NTP (Auto-setting of time) Time setting manually Environmental and Mechanical Temperature Range Operating -20°C~70°C Storage -30°C to 80°C Humidity (non-condensing) Dimensions Weight 0%~90% typical 260mm (L) x 84mm (W) x 55mm (H) 300g 59 .

These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device complies with Part 15 of the FCC Rules. However. IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.1093 paragraph (d)(2).Multi-Function Gigabit Wireless-N Client Bridge Version 1.0 Appendix B – FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device. pursuant to Part 15 of the FCC Rules. This device complies with FCC RF Exposure limits set forth for an uncontrolled environment. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. This equipment generates uses and can radiate radio frequency energy and. 60 . FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. Operation is subject to the following two conditions: (1) This device may not cause harmful interference. if not installed and used in accordance with the instructions. there is no guarantee that interference will not occur in a particular installation. including interference that may cause undesired operation. and (2) this device must accept any interference received. Consult the dealer or an experienced radio/TV technician for help. If this equipment does cause harmful interference to radio or television reception. Increase the separation between the equipment and receiver. may cause harmful interference to radio communications. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. which can be determined by turning the equipment off and on. under 47 CFR 2.